ethical-hacker video for lamont is in the process of debugging a software program. As he examines the code, he discovers that it is miswritten. Due to the
Lamont is in the process of debugging a software program. As he examines the code, he discovers that it is miswritten. Due to the error, the code does not validate a variable's size before allowing the information to be written into memory. Based on Lamont’s discovery, what type of attack might occur?